Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Security Policies and Procedures, Essay Example
Hire a Writer for Custom Essay
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
There are several security policies and procedures that my team recommended preventing Distributed Denial of Service (DDoS) attacks of a financial institution in New Zealand.
- The development of a denial service Response plan. The procedure for this policy is through systems checklist assessments, identification, and filtering of tools to make sure everything is in place (Dobran, 2018). It calls for the formation of a response team that will inform when the attack occurs, making sure the team knows exactly who to call after the attack and have a list of external and internal contacts to inform about it. A denial service response will, therefore, enhance and tighten security and prevent DDoS attacks in the future.
- The use of a security firewall. Firewalls are barriers or gatekeepers between the computer and the internet; this protects the computer from the spread of cyber viruses and malware. It filters all incoming or outgoing traffic to the computer by blocking malicious emails and preventing malware downloads from an untrusted website. There are two types of firewalls to consider; a hardware firewall and a software firewall (Kartich, 2016). Hardware firewalls are majorly routers that protect the entire local network from unauthorized external access; software security prevents overloading of servers with data, which results in network malfunction.
- The use of security software such as anti-spyware, anti-malware, and anti-virus programs. These programs detect malicious codes and contain them. Some of the common signs of DDoS attacks include slowing down of systems, email server overloading, corrupting of data files, and unexpected changes in the content of files. Therefore, employees will be trained on how to use the malware. If any of these signs are noted and suspected, security software should be used to diagnose the issue. Thus, installing security software will regulate DDoS attacks through network traffic monitoring and analysis.
- Update of programs and systems regularly. Updated systems and programs contain vital security upgrades that will ensure the safety of software (10 ways to prevent Cyber Attacks, 2020). This procedure is enacted through monitoring systems to prevent intrusions by use of detectors to alert unusual service in the computer system, such as email alerts or any other activity detected. In case of any traffic experience due to a DDoS attack, the intrusion detector will provide an alert.
- Raise awareness. Updating employees on relevant security policies and procedures to alert them on any attack is important. The information security policy states that each staff should concentrate on doing their job, their role, and their responsibilities (Ilvonen & Hellsten, 2015). Therefore, putting the above policies and procedures into consideration will greatly protect and prevent network attacks, minimizing future DDoS attacks in New Zealand.
Therefore, the inclusion of these policies will ensure that the organizations are protected from cyber-attacks that may cause DDoS, thus damaging the company’s reputation, which may lead to loss of customers.
References
Dobran, B. (2018). 7 tactics to prevent DDoS attack & keep your website safe. Phoenix Nap. https://phoenixnap.com/blog/prevent-ddos-attacks
Ilvonen, L., & Hellsten, P. (2015). Preparing for cyber threats with information security policies. International Journal of Cyber Warfare and Terrorism, 1-12. https://www.researchgate.net/publication/313118000_Preparing_for_Cyber_Threats_with_Information_Security_Policies
Kartich, R. (2016). Distributed Denial of Service Attacks: Four Best Practices for Prevention and Response. Insights. https://insights.sei.cmu.edu/blog/distributed-denial-of-service-attacks-four-best-practise.
Leaf-it. (2020). 10 ways to prevent cyber attacks. Leaf-it. https://leaf-it.com/10-ways-prevent-cyber-attacks/
Stuck with your Essay?
Get in touch with one of our experts for instant help!
Tags:
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee